General

  • Target

    3d61696033dd72276e194be148c310a02667b8b1b7d99cb1bd5f9149b8ed1423

  • Size

    49KB

  • Sample

    220703-dtdctsdccp

  • MD5

    048fcbdbbd1935b38920721aacb987c5

  • SHA1

    9675d7d277136e1e3886d8e1834a83160d58c98f

  • SHA256

    3d61696033dd72276e194be148c310a02667b8b1b7d99cb1bd5f9149b8ed1423

  • SHA512

    5dc6d711723b3ce82e5e3976281bedabaf675a95c5ffed2832c8a27b18805583ef1b35c30341281921af66e5db99d0712c7cbfd011747fbf1142b5b9b2f1fa4b

Malware Config

Targets

    • Target

      3d61696033dd72276e194be148c310a02667b8b1b7d99cb1bd5f9149b8ed1423

    • Size

      49KB

    • MD5

      048fcbdbbd1935b38920721aacb987c5

    • SHA1

      9675d7d277136e1e3886d8e1834a83160d58c98f

    • SHA256

      3d61696033dd72276e194be148c310a02667b8b1b7d99cb1bd5f9149b8ed1423

    • SHA512

      5dc6d711723b3ce82e5e3976281bedabaf675a95c5ffed2832c8a27b18805583ef1b35c30341281921af66e5db99d0712c7cbfd011747fbf1142b5b9b2f1fa4b

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

      suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks